First published: Sat Apr 30 2022(Updated: )
Multiple components in Apache NiFi 0.0.1 to 1.16.0 do not restrict XML External Entity references in the default configuration. The Standard Content Viewer service attempts to resolve XML External Entity references when viewing formatted XML files. The following Processors attempt to resolve XML External Entity references when configured with default property values: - EvaluateXPath - EvaluateXQuery - ValidateXml Apache NiFi flow configurations that include these Processors are vulnerable to malicious XML documents that contain Document Type Declarations with XML External Entity references. The resolution disables Document Type Declarations in the default configuration for these Processors, and disallows XML External Entity resolution in standard services.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache NiFi | >=0.0.1<=1.16.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-29265 is high with a CVSS score of 7.5.
Multiple components in Apache NiFi 0.0.1 to 1.16.0 are affected by CVE-2022-29265.
CVE-2022-29265 poses a risk of XML External Entity (XXE) attacks.
To mitigate CVE-2022-29265, update Apache NiFi to a version beyond 1.16.0.
More information about CVE-2022-29265 can be found on the Apache NiFi security page.